Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/842
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLennon, Brian, ; 1971- ; author. ; n2001040203. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:35Z-
dc.date.available2020-05-17T08:22:35Z-
dc.date.issued2018en_US
dc.identifier.isbn9780674980761 ; (alk. paper) ;en_US
dc.identifier.isbn067498076X ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/842-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractToday we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- ; Provided by publisher. ;en_US
dc.description.statementofresponsibilityBrian Lennon.en_US
dc.description.tableofcontentsPasswords: philology, security, authentication -- Cryptophilology, I -- Machine translation: a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. ;en_US
dc.format.extentxviii, 207 pages ; ; 24 cm. ;en_US
dc.format.extentIncludes bibliographical references and index. ;en_US
dc.publisherThe Belknap Press of Harvard University Press,en_US
dc.relation.haspart9780674980761.pdfen_US
dc.subjectComputers ; Access control ; Passwords. ;sh85029555. ;en_US
dc.subjectCryptography. ;sh85034453. ;en_US
dc.subjectData encryption (Computer science) ;sh94001524. ;en_US
dc.subjectPhilology. ;sh85100821. ;en_US
dc.subjectElectronic surveillance. ;sh86006641. ;en_US
dc.subjectComputers ; Access control ; Passwords. ; fast ; (OCoLC)fst00872785. ;en_US
dc.subjectCryptography. ; fast ; (OCoLC)fst00884552. ;en_US
dc.subjectData encryption (Computer science) ; fast ; (OCoLC)fst00887935. ;en_US
dc.subjectElectronic surveillance. ; fast ; (OCoLC)fst00907477. ;en_US
dc.subjectPhilology. ; fast ; (OCoLC)fst01060694. ;en_US
dc.subjectKryptologie. ; gnd. ;en_US
dc.subjectPasswort. ; gnd. ;en_US
dc.subjectPhilologie. ; gnd. ;en_US
dc.subjectTextverarbeitung. ; gnd. ;en_US
dc.subjectDigital Humanities. ; gnd. ;en_US
dc.subject.ddc005.8/24 ; 23 ;en_US
dc.subject.lccQA76.9.A25 ; L485 2018 ;en_US
dc.subject.lccQA76.9.A25 ; L485 2018 ;en_US
dc.titlePasswords :en_US
dc.title.alternativephilology, security, authentication /en_US
dc.typeBooken_US
dc.publisher.placeCambridge, Massachusetts ;en_US
dc.publisher.placeLondon, England :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9780674980761.pdf3.32 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLennon, Brian, ; 1971- ; author. ; n2001040203. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:35Z-
dc.date.available2020-05-17T08:22:35Z-
dc.date.issued2018en_US
dc.identifier.isbn9780674980761 ; (alk. paper) ;en_US
dc.identifier.isbn067498076X ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/842-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractToday we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- ; Provided by publisher. ;en_US
dc.description.statementofresponsibilityBrian Lennon.en_US
dc.description.tableofcontentsPasswords: philology, security, authentication -- Cryptophilology, I -- Machine translation: a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. ;en_US
dc.format.extentxviii, 207 pages ; ; 24 cm. ;en_US
dc.format.extentIncludes bibliographical references and index. ;en_US
dc.publisherThe Belknap Press of Harvard University Press,en_US
dc.relation.haspart9780674980761.pdfen_US
dc.subjectComputers ; Access control ; Passwords. ;sh85029555. ;en_US
dc.subjectCryptography. ;sh85034453. ;en_US
dc.subjectData encryption (Computer science) ;sh94001524. ;en_US
dc.subjectPhilology. ;sh85100821. ;en_US
dc.subjectElectronic surveillance. ;sh86006641. ;en_US
dc.subjectComputers ; Access control ; Passwords. ; fast ; (OCoLC)fst00872785. ;en_US
dc.subjectCryptography. ; fast ; (OCoLC)fst00884552. ;en_US
dc.subjectData encryption (Computer science) ; fast ; (OCoLC)fst00887935. ;en_US
dc.subjectElectronic surveillance. ; fast ; (OCoLC)fst00907477. ;en_US
dc.subjectPhilology. ; fast ; (OCoLC)fst01060694. ;en_US
dc.subjectKryptologie. ; gnd. ;en_US
dc.subjectPasswort. ; gnd. ;en_US
dc.subjectPhilologie. ; gnd. ;en_US
dc.subjectTextverarbeitung. ; gnd. ;en_US
dc.subjectDigital Humanities. ; gnd. ;en_US
dc.subject.ddc005.8/24 ; 23 ;en_US
dc.subject.lccQA76.9.A25 ; L485 2018 ;en_US
dc.subject.lccQA76.9.A25 ; L485 2018 ;en_US
dc.titlePasswords :en_US
dc.title.alternativephilology, security, authentication /en_US
dc.typeBooken_US
dc.publisher.placeCambridge, Massachusetts ;en_US
dc.publisher.placeLondon, England :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9780674980761.pdf3.32 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLennon, Brian, ; 1971- ; author. ; n2001040203. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:22:35Z-
dc.date.available2020-05-17T08:22:35Z-
dc.date.issued2018en_US
dc.identifier.isbn9780674980761 ; (alk. paper) ;en_US
dc.identifier.isbn067498076X ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/842-
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractToday we regard cryptology, the technical science of ciphers and codes, and philology, the humanistic study of human languages, as separate domains of activity. But the contiguity of these two domains is a historical fact with an institutional history. From the earliest documented techniques for the statistical analysis of text to the computational philology of early twenty-first-century digital humanities, what Brian Lennon calls "crypto-philology" has flourished alongside, and sometimes directly served, imperial nationalism and war. Lennon argues that while computing's humanistic applications are as historically important as its mathematical and technical origins, they are no less marked by the priorities of institutions devoted to signals intelligence. The convergence of philology with cryptology, Lennon suggests, is embodied in the password, an artifact of the linguistic history of computing that each of us uses every day to secure access to personal data and other resources. The password is a site where philology and cryptology, and their contiguous histories, meet in everyday life, as the natural-language dictionary becomes an instrument of the hacker's exploit.-- ; Provided by publisher. ;en_US
dc.description.statementofresponsibilityBrian Lennon.en_US
dc.description.tableofcontentsPasswords: philology, security, authentication -- Cryptophilology, I -- Machine translation: a tale of two cultures -- Cryptophilology, II -- The digital humanities and national security. ;en_US
dc.format.extentxviii, 207 pages ; ; 24 cm. ;en_US
dc.format.extentIncludes bibliographical references and index. ;en_US
dc.publisherThe Belknap Press of Harvard University Press,en_US
dc.relation.haspart9780674980761.pdfen_US
dc.subjectComputers ; Access control ; Passwords. ;sh85029555. ;en_US
dc.subjectCryptography. ;sh85034453. ;en_US
dc.subjectData encryption (Computer science) ;sh94001524. ;en_US
dc.subjectPhilology. ;sh85100821. ;en_US
dc.subjectElectronic surveillance. ;sh86006641. ;en_US
dc.subjectComputers ; Access control ; Passwords. ; fast ; (OCoLC)fst00872785. ;en_US
dc.subjectCryptography. ; fast ; (OCoLC)fst00884552. ;en_US
dc.subjectData encryption (Computer science) ; fast ; (OCoLC)fst00887935. ;en_US
dc.subjectElectronic surveillance. ; fast ; (OCoLC)fst00907477. ;en_US
dc.subjectPhilology. ; fast ; (OCoLC)fst01060694. ;en_US
dc.subjectKryptologie. ; gnd. ;en_US
dc.subjectPasswort. ; gnd. ;en_US
dc.subjectPhilologie. ; gnd. ;en_US
dc.subjectTextverarbeitung. ; gnd. ;en_US
dc.subjectDigital Humanities. ; gnd. ;en_US
dc.subject.ddc005.8/24 ; 23 ;en_US
dc.subject.lccQA76.9.A25 ; L485 2018 ;en_US
dc.subject.lccQA76.9.A25 ; L485 2018 ;en_US
dc.titlePasswords :en_US
dc.title.alternativephilology, security, authentication /en_US
dc.typeBooken_US
dc.publisher.placeCambridge, Massachusetts ;en_US
dc.publisher.placeLondon, England :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9780674980761.pdf3.32 MBAdobe PDFThumbnail
Preview File